Development of a device for protection against unauthorized access based on three-factor identification and user authentication
A device to provide protection against unauthorized access to information based on the use of three-factor identification and user authentication with the ability to differentiate access to the information environment containing confidential information has been developed. Differentiation of access...
Збережено в:
| Дата: | 2021 |
|---|---|
| Автори: | , , , |
| Формат: | Стаття |
| Мова: | Ukrainian |
| Опубліковано: |
Інститут проблем реєстрації інформації НАН України
2021
|
| Теми: | |
| Онлайн доступ: | http://drsp.ipri.kiev.ua/article/view/239250 |
| Теги: |
Додати тег
Немає тегів, Будьте першим, хто поставить тег для цього запису!
|
| Назва журналу: | Data Recording, Storage & Processing |
Репозитарії
Data Recording, Storage & Processing| Резюме: | A device to provide protection against unauthorized access to information based on the use of three-factor identification and user authentication with the ability to differentiate access to the information environment containing confidential information has been developed. Differentiation of access rights involves the division of users into three separate groups, members of these groups have different levels of access to information resources of the system, granting of access for each level is implemented by a combination of several authentication methods: for the level 3 it is a scan of the QR code, for the level 2, this is a QR ID scan and a fingerprint scan, for the level 1 it is a scan of the user ID, confirmation by biometric features, and also request of the unique password for access to system level. The device also allows detecting attempts of unauthorized access in advance, providing access to information resources to authorized users, even in case of failure of the device and in case of emergencies. It has increased durability and resistance to physical breakage, improves the system of information protection at different business entities, being more informative and easy for the user, it does not require special knowledge in the field of technical protection of information. It allows detect unauthorized access attempts, to restore basic functions of the device in emergency situations The developed device was modeled in a software environment for computer-aided design, which confirmed its functionality and ability to perform the stated tasks. Possibility of a modular design of the device allows simplify and reduce production costs and relative versatility and the flexibility of the software provides a wide range of possibilities for application in real objects of information activity. Fig.: 2. Refs: 11 titles. |
|---|